Cryptography: New Applications
https://www.maplesoft.com/applications/category.aspx?cid=204
en-us2021 Maplesoft, A Division of Waterloo Maple Inc.Maplesoft Document SystemTue, 13 Apr 2021 12:39:24 GMTTue, 13 Apr 2021 12:39:24 GMTNew applications in the Cryptography categoryhttps://www.maplesoft.com/images/Application_center_hp.jpgCryptography: New Applications
https://www.maplesoft.com/applications/category.aspx?cid=204
Strong Cryptographic Protection of Folders Using Fast Byte-Oriented Stream-Cipher with Addition in GF(256) and Key Length 2048 Bits
https://www.maplesoft.com/applications/view.aspx?SID=154117&ref=Feed
This application provides a user-friendly, mouse-driven encryption program that can be used to protect an entire folder of information at one time, including information stored in a cloud, on a hard disk, and on pendrives. It is suitable for use by anyone who has a need to protect information stored on their computers. The algorithm used is a fast byte-oriented stream-cipher that performs addition operations in GF(256) and uses a secret key of length 2048 bits.<img src="https://www.maplesoft.com/view.aspx?si=154117/bca image.png" alt="Strong Cryptographic Protection of Folders Using Fast Byte-Oriented Stream-Cipher with Addition in GF(256) and Key Length 2048 Bits" style="max-width: 25%;" align="left"/>This application provides a user-friendly, mouse-driven encryption program that can be used to protect an entire folder of information at one time, including information stored in a cloud, on a hard disk, and on pendrives. It is suitable for use by anyone who has a need to protect information stored on their computers. The algorithm used is a fast byte-oriented stream-cipher that performs addition operations in GF(256) and uses a secret key of length 2048 bits.https://www.maplesoft.com/applications/view.aspx?SID=154117&ref=FeedThu, 09 Jun 2016 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyCryptographic Protection of E-Mail Attachment with Filename Extensions `txt`, `doc`, `docx`, `rtf` or `mw` Using the Secret Key of Length 1980 Bits
https://www.maplesoft.com/applications/view.aspx?SID=154109&ref=Feed
This worksheet contains an easy-to-use applications for encrypting and decrypting email attachments to ensure the security of confidential information. It can be used with Word, text, RTF, and Maple documents. The key space used by the algorithms is huge (1980 bits), therefore, the encrypted contents of the file is in practice unbreakable.<img src="https://www.maplesoft.com/view.aspx?si=154109/tk1980b64.jpg" alt="Cryptographic Protection of E-Mail Attachment with Filename Extensions `txt`, `doc`, `docx`, `rtf` or `mw` Using the Secret Key of Length 1980 Bits" style="max-width: 25%;" align="left"/>This worksheet contains an easy-to-use applications for encrypting and decrypting email attachments to ensure the security of confidential information. It can be used with Word, text, RTF, and Maple documents. The key space used by the algorithms is huge (1980 bits), therefore, the encrypted contents of the file is in practice unbreakable.https://www.maplesoft.com/applications/view.aspx?SID=154109&ref=FeedMon, 23 May 2016 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyTransport Encoding/Decoding and Cryptographic Protection of Computer Storage
https://www.maplesoft.com/applications/view.aspx?SID=154088&ref=Feed
This worksheet contains two user-friendly useful applications for encrypting personal files. One is useful for encoding arbitrary binary information, such as, for example, *.exe files, encrypted messages, cryptographic keys and audio and image files, for transmission by electronic mail. The second application provides an easy mechanism for non-computer science specialists to protect confidential data stored on their computers.<img src="https://www.maplesoft.com/view.aspx?si=154088/cspr.jpg" alt="Transport Encoding/Decoding and Cryptographic Protection of Computer Storage" style="max-width: 25%;" align="left"/>This worksheet contains two user-friendly useful applications for encrypting personal files. One is useful for encoding arbitrary binary information, such as, for example, *.exe files, encrypted messages, cryptographic keys and audio and image files, for transmission by electronic mail. The second application provides an easy mechanism for non-computer science specialists to protect confidential data stored on their computers.https://www.maplesoft.com/applications/view.aspx?SID=154088&ref=FeedThu, 21 Apr 2016 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyByte Frequency Analyzer
https://www.maplesoft.com/applications/view.aspx?SID=153920&ref=Feed
In the cryptographic research an important operation is to determine the byte-frequency of non-encrypted and encrypted files. This action allows us to appraise the quality of the cryptographic algorithms. This application implements a `byte-frequency analyzer` in Maple. Results are displayed in column graphs, using both linear and logarithmic scales on the y-axis. The logarithmic y-axis is very useful if the differences between the byte values are large. The displayed column graphs can be exported in six formats (Bitmap, PNG, GIF, JPEG, Encapsulated Postcript, PDF and Windows Metafile) for use in documents concerning cryptography and file processing tools.<img src="https://www.maplesoft.com/view.aspx?si=153920/bytefreq.png" alt="Byte Frequency Analyzer" style="max-width: 25%;" align="left"/>In the cryptographic research an important operation is to determine the byte-frequency of non-encrypted and encrypted files. This action allows us to appraise the quality of the cryptographic algorithms. This application implements a `byte-frequency analyzer` in Maple. Results are displayed in column graphs, using both linear and logarithmic scales on the y-axis. The logarithmic y-axis is very useful if the differences between the byte values are large. The displayed column graphs can be exported in six formats (Bitmap, PNG, GIF, JPEG, Encapsulated Postcript, PDF and Windows Metafile) for use in documents concerning cryptography and file processing tools.https://www.maplesoft.com/applications/view.aspx?SID=153920&ref=FeedThu, 12 Nov 2015 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyThe SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions
https://www.maplesoft.com/applications/view.aspx?SID=153903&ref=Feed
The National Institute of Standards and Technology (NIST) has released the final version of its "Secure Hash Algorithm-3" (SHA-3) standard in August 2015. The new standard ("Federal Information Processing Standard (FIPS) 202") specifies four cryptographic hash functions, called SHA3-224, SHA3-256, SHA3-384 and SHA3-512, as well as two Extendable-Output Functions (XOFs), called SHAKE128 and SHAKE256. These functions are based on the Keccak sponge function, designed by G. Bertoni, J. Daemen, M. Peeters and G. Van Assche. The hash functions are an essential tool for securing the integrity of electronic information and the XOFs offer the added flexibility of having a variable output length. This application contains an implementation of these functions and also of the SHA-3-based Message Authentication Code HMAC.<img src="https://www.maplesoft.com/view.aspx?si=153903/keccak.jpg" alt="The SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions" style="max-width: 25%;" align="left"/>The National Institute of Standards and Technology (NIST) has released the final version of its "Secure Hash Algorithm-3" (SHA-3) standard in August 2015. The new standard ("Federal Information Processing Standard (FIPS) 202") specifies four cryptographic hash functions, called SHA3-224, SHA3-256, SHA3-384 and SHA3-512, as well as two Extendable-Output Functions (XOFs), called SHAKE128 and SHAKE256. These functions are based on the Keccak sponge function, designed by G. Bertoni, J. Daemen, M. Peeters and G. Van Assche. The hash functions are an essential tool for securing the integrity of electronic information and the XOFs offer the added flexibility of having a variable output length. This application contains an implementation of these functions and also of the SHA-3-based Message Authentication Code HMAC.https://www.maplesoft.com/applications/view.aspx?SID=153903&ref=FeedFri, 16 Oct 2015 04:00:00 ZJosé Luis Gómez PardoJosé Luis Gómez PardoMaple Implementation of the Secure Transport Encryption Scheme
https://www.maplesoft.com/applications/view.aspx?SID=153863&ref=Feed
An easy-to-use interactive Maple implementation of transport encryption scheme has been presented. It allows to encrypt any file with arbitrary extension stored in the used computer system and in portable memory devices. The encrypted file may contain all 7-bit characters. Therefore, the encrypted file can be securely transmitted over the internet as an e-mail enclosure. The application encrypts also the name of the plaintext file: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. On encryption/decryption in the GUI Text Area the user will see an exhaustive information about the performed task. On decryption, the encrypted file is removed. The presented applications sm128b.mw must have permission to save and remove the processed files. It is worth to know that the secret key in the application is embedded. Thus, any user can embed his own secret key in the application in many ways.<img src="https://www.maplesoft.com/view.aspx?si=153863/transport.png" alt="Maple Implementation of the Secure Transport Encryption Scheme" style="max-width: 25%;" align="left"/>An easy-to-use interactive Maple implementation of transport encryption scheme has been presented. It allows to encrypt any file with arbitrary extension stored in the used computer system and in portable memory devices. The encrypted file may contain all 7-bit characters. Therefore, the encrypted file can be securely transmitted over the internet as an e-mail enclosure. The application encrypts also the name of the plaintext file: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. On encryption/decryption in the GUI Text Area the user will see an exhaustive information about the performed task. On decryption, the encrypted file is removed. The presented applications sm128b.mw must have permission to save and remove the processed files. It is worth to know that the secret key in the application is embedded. Thus, any user can embed his own secret key in the application in many ways.https://www.maplesoft.com/applications/view.aspx?SID=153863&ref=FeedWed, 09 Sep 2015 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyMaple Implementation of Transport Encryption Scheme Using the Secret Key of Length 479 Bits
https://www.maplesoft.com/applications/view.aspx?SID=153841&ref=Feed
An easy-to-use Maple implementation of transport encryption has been presented. It allows encrypting any file with arbitrary extension stored in the used computer system. The encrypted file contains space, alphabetic and decimal digit characters and the following special characters !#$%&'()*+,-./:;<=>?@[]^_`{|}~. These 93 printable characters can be defined by the set {32, 33, 35, seq(i, i=36 .. 91), seq(i, i=93 .. 126)} of byte values. Therefore, the encrypted file can be not only securely transmitted over the internet as an e-mail enclosure, but also protected effectively against unauthorized access. The application encrypts the name of the plaintext file as well: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. The size of the encrypted file is about 22.3% greater than the size of the plaintext file. On encryption/decryption in the GUI Text Area the user will see exhaustive information about the performed task. On decryption, the encrypted file is removed. It is worth knowing that the secret key in the application is embedded. Thus, any user can install his own secret key in the application in many ways. For example, he can change the value of the variable skc and the value of the variable seed in the procedures fne and fnd. The presented applications fed479k.mw must have permission to save and to remove the processed files. For security reason the application worksheet fed479k.mw ought to be stored in the meticulously watched over pen drive.<img src="https://www.maplesoft.com/view.aspx?si=153841/im.jpg" alt="Maple Implementation of Transport Encryption Scheme Using the Secret Key of Length 479 Bits" style="max-width: 25%;" align="left"/>An easy-to-use Maple implementation of transport encryption has been presented. It allows encrypting any file with arbitrary extension stored in the used computer system. The encrypted file contains space, alphabetic and decimal digit characters and the following special characters !#$%&'()*+,-./:;<=>?@[]^_`{|}~. These 93 printable characters can be defined by the set {32, 33, 35, seq(i, i=36 .. 91), seq(i, i=93 .. 126)} of byte values. Therefore, the encrypted file can be not only securely transmitted over the internet as an e-mail enclosure, but also protected effectively against unauthorized access. The application encrypts the name of the plaintext file as well: this way, the kind of content of the plaintext file is hidden. The encrypted file is saved in the same folder as the plaintext file. The size of the encrypted file is about 22.3% greater than the size of the plaintext file. On encryption/decryption in the GUI Text Area the user will see exhaustive information about the performed task. On decryption, the encrypted file is removed. It is worth knowing that the secret key in the application is embedded. Thus, any user can install his own secret key in the application in many ways. For example, he can change the value of the variable skc and the value of the variable seed in the procedures fne and fnd. The presented applications fed479k.mw must have permission to save and to remove the processed files. For security reason the application worksheet fed479k.mw ought to be stored in the meticulously watched over pen drive.https://www.maplesoft.com/applications/view.aspx?SID=153841&ref=FeedThu, 13 Aug 2015 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyMaple Implementation of Transport Encoding and Transport Encrypting with the Secret Key of Length 1980 bits Using John Walker's Base 64 Encoding Scheme
https://www.maplesoft.com/applications/view.aspx?SID=153721&ref=Feed
<p>The application uses John Walker's very useful and accessible in the Internet implementation of a fast Base 64 encoding and decoding scheme. Presented worksheet allows to perform fast transport encoding and encrypting of files of an arbitrary format. The secret key in the application is embedded. It can easily be generated using the `keygen` procedure and an arbitrary `password` string. Evidently, many procedures for key generation may be implemented. The user can also himself directly construct the global variables `b2o`, `o2b`, `f2o` and `o2f` used in the encryption/decryption procedures. The code of the application in the startup code region and in the combobox `select action` is stored.</p>
<P><B>Note:</B> For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\transport.</p><img src="https://www.maplesoft.com/applications/images/app_image_blank_lg.jpg" alt="Maple Implementation of Transport Encoding and Transport Encrypting with the Secret Key of Length 1980 bits Using John Walker's Base 64 Encoding Scheme" style="max-width: 25%;" align="left"/><p>The application uses John Walker's very useful and accessible in the Internet implementation of a fast Base 64 encoding and decoding scheme. Presented worksheet allows to perform fast transport encoding and encrypting of files of an arbitrary format. The secret key in the application is embedded. It can easily be generated using the `keygen` procedure and an arbitrary `password` string. Evidently, many procedures for key generation may be implemented. The user can also himself directly construct the global variables `b2o`, `o2b`, `f2o` and `o2f` used in the encryption/decryption procedures. The code of the application in the startup code region and in the combobox `select action` is stored.</p>
<P><B>Note:</B> For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\transport.</p>https://www.maplesoft.com/applications/view.aspx?SID=153721&ref=FeedTue, 16 Dec 2014 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyA new Approach to Transport Encryption
https://www.maplesoft.com/applications/view.aspx?SID=153715&ref=Feed
<p>Living in the global surveillance era, any internet user should himself organize the secrecy of his communication. Therefore, in the submission, it is shown how to use the base conversion as an effective cryptographic transformation because the statistical structure of the encoded file is quite different from that of the input file. </p><img src="https://www.maplesoft.com/applications/images/app_image_blank_lg.jpg" alt="A new Approach to Transport Encryption" style="max-width: 25%;" align="left"/><p>Living in the global surveillance era, any internet user should himself organize the secrecy of his communication. Therefore, in the submission, it is shown how to use the base conversion as an effective cryptographic transformation because the statistical structure of the encoded file is quite different from that of the input file. </p>https://www.maplesoft.com/applications/view.aspx?SID=153715&ref=FeedWed, 03 Dec 2014 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyStrong Cryptographic File Protection Using Base 32 Encoding Scheme
https://www.maplesoft.com/applications/view.aspx?SID=153686&ref=Feed
<p>It has been shown how to implement user-friendly tool for strong cryptographic protection of e-mail enclosures.</p><img src="https://www.maplesoft.com/view.aspx?si=153686/Patio.jpg" alt="Strong Cryptographic File Protection Using Base 32 Encoding Scheme" style="max-width: 25%;" align="left"/><p>It has been shown how to implement user-friendly tool for strong cryptographic protection of e-mail enclosures.</p>https://www.maplesoft.com/applications/view.aspx?SID=153686&ref=FeedFri, 10 Oct 2014 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyElGamal E-mail Encryption Scheme
https://www.maplesoft.com/applications/view.aspx?SID=153538&ref=Feed
<p>The submission shows how to implement the user-friendly, but mathematically sophisticated strong e-mail encryption scheme using the ElGamal algorithm working in the multiplicative group of GF(p^m) (http://www.maplesoft.com/applications/view.aspx?SID=4403, J. L. G. Pardo - Introduction to Cryptography with Maple). On unpacking the file `elgmail.zip` the user will see three public key files: `ElGpub_Eve_Flower.m`, `ElGpub_Jack_Herod.m`, `ElGpub_Michele_Lazy.m` and three application worksheets: `ElGedm_Flower.mw`, `ElGedm_Herod.mw`, `ElGedm_Lazy.mw` in which the proper private keys are embedded. Each of the three users can encrypt an e-mail letter and can send the encrypted message to the required addressee, knowing its public key. Evidently, any user can also decrypt the proper encrypted message, addressed to him. The way of generating the public and private keys demonstrates the worksheet ElGkg.mw. The data contained in the names of the computed keys using the worksheet ElGkg.mw is evident. In the presented example the e-mail message should contain no more than 782 printable characters with byte values less than 127. The scheme can be accepted for any e-mail system: the public keys and encrypted messages are Maple `*.m` format files containing characters with 91 byte values from the set {10, 33 .. 122}. The user can also observe the time needed for encryption, decryption and the computation of keys, and the encryption scheme redundancy. An example test message and its cryptogram is also presented and the user can check for which the encrypted test message ought to be sent.</p><img src="https://www.maplesoft.com/view.aspx?si=153538/image.PNG" alt="ElGamal E-mail Encryption Scheme" style="max-width: 25%;" align="left"/><p>The submission shows how to implement the user-friendly, but mathematically sophisticated strong e-mail encryption scheme using the ElGamal algorithm working in the multiplicative group of GF(p^m) (http://www.maplesoft.com/applications/view.aspx?SID=4403, J. L. G. Pardo - Introduction to Cryptography with Maple). On unpacking the file `elgmail.zip` the user will see three public key files: `ElGpub_Eve_Flower.m`, `ElGpub_Jack_Herod.m`, `ElGpub_Michele_Lazy.m` and three application worksheets: `ElGedm_Flower.mw`, `ElGedm_Herod.mw`, `ElGedm_Lazy.mw` in which the proper private keys are embedded. Each of the three users can encrypt an e-mail letter and can send the encrypted message to the required addressee, knowing its public key. Evidently, any user can also decrypt the proper encrypted message, addressed to him. The way of generating the public and private keys demonstrates the worksheet ElGkg.mw. The data contained in the names of the computed keys using the worksheet ElGkg.mw is evident. In the presented example the e-mail message should contain no more than 782 printable characters with byte values less than 127. The scheme can be accepted for any e-mail system: the public keys and encrypted messages are Maple `*.m` format files containing characters with 91 byte values from the set {10, 33 .. 122}. The user can also observe the time needed for encryption, decryption and the computation of keys, and the encryption scheme redundancy. An example test message and its cryptogram is also presented and the user can check for which the encrypted test message ought to be sent.</p>https://www.maplesoft.com/applications/view.aspx?SID=153538&ref=FeedWed, 02 Apr 2014 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyGeneralized byte-oriented fast stream cipher that is resistant to reverse engineering
https://www.maplesoft.com/applications/view.aspx?SID=153499&ref=Feed
<p>A new numerous family of strong, to reverse engineering resistant, and fast byte-oriented stream-ciphers has been presented. One ought to unpack the file gbosc.zip, open the worksheet gbosc.mw in the Maple session, read it and test the application described.</p><img src="https://www.maplesoft.com/applications/images/app_image_blank_lg.jpg" alt="Generalized byte-oriented fast stream cipher that is resistant to reverse engineering" style="max-width: 25%;" align="left"/><p>A new numerous family of strong, to reverse engineering resistant, and fast byte-oriented stream-ciphers has been presented. One ought to unpack the file gbosc.zip, open the worksheet gbosc.mw in the Maple session, read it and test the application described.</p>https://www.maplesoft.com/applications/view.aspx?SID=153499&ref=FeedTue, 28 Jan 2014 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyMaple `Keyless` Base b Encryption Scheme
https://www.maplesoft.com/applications/view.aspx?SID=149026&ref=Feed
In this submission it will be shown that the convert/base built-in function can be used to create many new tools which can encrypt or decrypt any file selected. Such a tool, named Maple "keyless` base b encryption scheme, allows to determine the admissible number of elements of the set of ASCII decimals which will be present in the encrypted file, and to choose all the elements of this set.<img src="https://www.maplesoft.com/applications/images/app_image_blank_lg.jpg" alt="Maple `Keyless` Base b Encryption Scheme" style="max-width: 25%;" align="left"/>In this submission it will be shown that the convert/base built-in function can be used to create many new tools which can encrypt or decrypt any file selected. Such a tool, named Maple "keyless` base b encryption scheme, allows to determine the admissible number of elements of the set of ASCII decimals which will be present in the encrypted file, and to choose all the elements of this set.https://www.maplesoft.com/applications/view.aspx?SID=149026&ref=FeedMon, 01 Jul 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyC64K366 "Keyless" File Encryption
https://www.maplesoft.com/applications/view.aspx?SID=147752&ref=Feed
<p>This maplet application fulfilling the role of the secret key uses base 64 encoding scheme non-linear transformations for encrypting or decrypting e-mailed files. The encrypted files with extension ".e64" contain only 64 characters belonging to the set of base 64 encoding scheme alphabet and 23 characters "()<>[]{}|-*^_!?@#$%&,:;". The application uses original encryption tool named C64K366. The number following the letter "C" means that any encrypted file contains only 64 characters with ASCII decimals belonging to the set {33, 35 .. 38, 40 .. 45, 47 .. 60, 62 .. 91, 93 .. 95, 97 .. 125}. K366 means that the secret key length equals to 366 bits. For proper functioning of the application, the c64k366.maplet must be saved in a location with no spaces in the path name. </p><img src="https://www.maplesoft.com/applications/images/app_image_blank_lg.jpg" alt="C64K366 "Keyless" File Encryption" style="max-width: 25%;" align="left"/><p>This maplet application fulfilling the role of the secret key uses base 64 encoding scheme non-linear transformations for encrypting or decrypting e-mailed files. The encrypted files with extension ".e64" contain only 64 characters belonging to the set of base 64 encoding scheme alphabet and 23 characters "()<>[]{}|-*^_!?@#$%&,:;". The application uses original encryption tool named C64K366. The number following the letter "C" means that any encrypted file contains only 64 characters with ASCII decimals belonging to the set {33, 35 .. 38, 40 .. 45, 47 .. 60, 62 .. 91, 93 .. 95, 97 .. 125}. K366 means that the secret key length equals to 366 bits. For proper functioning of the application, the c64k366.maplet must be saved in a location with no spaces in the path name. </p>https://www.maplesoft.com/applications/view.aspx?SID=147752&ref=FeedMon, 27 May 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyBase 64 "Keyless" File Encryption
https://www.maplesoft.com/applications/view.aspx?SID=145918&ref=Feed
Abstract: A "keyless" cipher not using complex mathematical formulas but applying non-linear transformations of base 64 encoding scheme has been described. The word "keyless" means that the encrypting/decrypting application itself fulfills the role of the secret key and should be carefully watched and stored. Presented tool is mainly suitable for cryptographic protection of e-mail enclosures.<BR>
<P>
Note: For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\keyless.<img src="https://www.maplesoft.com/applications/images/app_image_blank_lg.jpg" alt="Base 64 "Keyless" File Encryption" style="max-width: 25%;" align="left"/>Abstract: A "keyless" cipher not using complex mathematical formulas but applying non-linear transformations of base 64 encoding scheme has been described. The word "keyless" means that the encrypting/decrypting application itself fulfills the role of the secret key and should be carefully watched and stored. Presented tool is mainly suitable for cryptographic protection of e-mail enclosures.<BR>
<P>
Note: For proper functioning of this application, this application must be saved in a location with no spaces in the path name, e.g. C:\keyless.https://www.maplesoft.com/applications/view.aspx?SID=145918&ref=FeedMon, 15 Apr 2013 04:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnySafe AES CBC mode directory encryption/decryption
https://www.maplesoft.com/applications/view.aspx?SID=129678&ref=Feed
<p>Meaningful number of people believe that in AES is a secret backdoor (e.g. http://forums.hak5.org/index.php?showtopic=13355, http://www.infoworld.com/d/security/aes-proved-vulnerable-microsoft-researchers-170218). It may be supposed that the backdoor can be generated by the KeyExpansion routine and by the process of executing many times cryptographic transformations. As it is known, the element of the AES algorithm, KeyExpansion routine, processes an entered by the user secret key of 4*Nk bytes, Nk equal either 4, 6 or 8 and generates an expanded key w containing 16*(Nr+1) bytes, Nr denoting the number of so-called rounds equal 10 if Nk = 4, equal 12 in case Nk=6 and equal 14 in case Nk is 8. Such intentional manipulation on the secret key can breed the elimination of many of its bytes, and the eliminated bytes of the secret key may be replaced by the values known to initiates. In the presented application this hypothetic thread is entirely eliminated: the KeyExpansion routine is not used, the value of Nr is equal to 1, thus, the expanded key w contains 32 random bytes, dependent on the user password only. This way the presented implementation can be considered as a secure AES with 256 bit key, which is many times more faster than the conventional algorithm. </p><img src="https://www.maplesoft.com/view.aspx?si=129678/428741\81fabfc30943ffa4aec8aaff414e3de3.gif" alt="Safe AES CBC mode directory encryption/decryption" style="max-width: 25%;" align="left"/><p>Meaningful number of people believe that in AES is a secret backdoor (e.g. http://forums.hak5.org/index.php?showtopic=13355, http://www.infoworld.com/d/security/aes-proved-vulnerable-microsoft-researchers-170218). It may be supposed that the backdoor can be generated by the KeyExpansion routine and by the process of executing many times cryptographic transformations. As it is known, the element of the AES algorithm, KeyExpansion routine, processes an entered by the user secret key of 4*Nk bytes, Nk equal either 4, 6 or 8 and generates an expanded key w containing 16*(Nr+1) bytes, Nr denoting the number of so-called rounds equal 10 if Nk = 4, equal 12 in case Nk=6 and equal 14 in case Nk is 8. Such intentional manipulation on the secret key can breed the elimination of many of its bytes, and the eliminated bytes of the secret key may be replaced by the values known to initiates. In the presented application this hypothetic thread is entirely eliminated: the KeyExpansion routine is not used, the value of Nr is equal to 1, thus, the expanded key w contains 32 random bytes, dependent on the user password only. This way the presented implementation can be considered as a secure AES with 256 bit key, which is many times more faster than the conventional algorithm. </p>https://www.maplesoft.com/applications/view.aspx?SID=129678&ref=FeedMon, 16 Jan 2012 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyCBC Mode Fast AES Directory Encryption/Decryption
https://www.maplesoft.com/applications/view.aspx?SID=129039&ref=Feed
<p>The application shows how to implement a Maple wrapper for a binary file executing the AES algorithm about 5 000 times faster than two Maple implementations of this algorithm published in Maple Application Center.</p><img src="https://www.maplesoft.com/view.aspx?si=129039/CBCdirect_sm.jpg" alt="CBC Mode Fast AES Directory Encryption/Decryption" style="max-width: 25%;" align="left"/><p>The application shows how to implement a Maple wrapper for a binary file executing the AES algorithm about 5 000 times faster than two Maple implementations of this algorithm published in Maple Application Center.</p>https://www.maplesoft.com/applications/view.aspx?SID=129039&ref=FeedFri, 23 Dec 2011 05:00:00 ZCzeslaw KoscielnyCzeslaw KoscielnyThe Advanced Encryption Standard and its modes of operation
https://www.maplesoft.com/applications/view.aspx?SID=6618&ref=Feed
<p>This is an update, labeled version 1.1, to the existing application The Advanced Encryption Standard and its modes of operation.</p>
<p>Version 1.1: Key generation function and related functions updated to facilitate the use of externally generated seeds. Some minor changes to presentation.</p>
<p>Version 1.0: Implementation of encryption and authentication schemes that use the Advanced Encryption Standard (AES) as their underlying block cipher. These schemes are constructed by using all the modes of operation for block ciphers so far approved by NIST (the US National Institute of Standards of Technology), namely, the five confidentiality modes: ECB, CBC, CFB, OFB and CTR, the authentication mode CMAC, and the "authenticated encryption" modes CCM and GCM/GMAC. The implementation is able to encrypt/decrypt and/or authenticate messages in several formats, including binary files, and we use it to explore the basic properties of these schemes. The implementation contains also detailed explanations of all the procedures used, including the lower level ones, and discusses both the programming and the cryptographic aspects involved.</p><img src="https://www.maplesoft.com/view.aspx?si=6618/AES_1608.gif" alt="The Advanced Encryption Standard and its modes of operation" style="max-width: 25%;" align="left"/><p>This is an update, labeled version 1.1, to the existing application The Advanced Encryption Standard and its modes of operation.</p>
<p>Version 1.1: Key generation function and related functions updated to facilitate the use of externally generated seeds. Some minor changes to presentation.</p>
<p>Version 1.0: Implementation of encryption and authentication schemes that use the Advanced Encryption Standard (AES) as their underlying block cipher. These schemes are constructed by using all the modes of operation for block ciphers so far approved by NIST (the US National Institute of Standards of Technology), namely, the five confidentiality modes: ECB, CBC, CFB, OFB and CTR, the authentication mode CMAC, and the "authenticated encryption" modes CCM and GCM/GMAC. The implementation is able to encrypt/decrypt and/or authenticate messages in several formats, including binary files, and we use it to explore the basic properties of these schemes. The implementation contains also detailed explanations of all the procedures used, including the lower level ones, and discusses both the programming and the cryptographic aspects involved.</p>https://www.maplesoft.com/applications/view.aspx?SID=6618&ref=FeedMon, 20 Jun 2011 04:00:00 ZJosé Luis Gómez PardoJosé Luis Gómez PardoMasquerade Mode Protection of Disk Files
https://www.maplesoft.com/applications/view.aspx?SID=102979&ref=Feed
<p> An unbreakable protection system of disk files against unauthorized access has been presented. The system consists in replacing the protected files with an arbitrary file which plays a role of cryptogram and hence MASQUERADE MODE PROTECTION OF DISK FILES has been named.</p><img src="https://www.maplesoft.com/view.aspx?si=102979/322396\mpdf/mpf/jpgfile.jpg" alt="Masquerade Mode Protection of Disk Files" style="max-width: 25%;" align="left"/><p> An unbreakable protection system of disk files against unauthorized access has been presented. The system consists in replacing the protected files with an arbitrary file which plays a role of cryptogram and hence MASQUERADE MODE PROTECTION OF DISK FILES has been named.</p>https://www.maplesoft.com/applications/view.aspx?SID=102979&ref=FeedFri, 25 Mar 2011 04:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw KoscielnyColor Image Cryptosteganography
https://www.maplesoft.com/applications/view.aspx?SID=102316&ref=Feed
<p> The application presented allows Maple users to protect<br />files saved in the selected directory against unauthorized <br />access and intentional damage by generating cryptosteganograms<br />which are regular image files of BMP or TIFF format. <br />Unpack the icss.zip file, open the file icssabout.mw<br />and use the application.</p><img src="https://www.maplesoft.com/view.aspx?si=102316/CS.jpg" alt="Color Image Cryptosteganography" style="max-width: 25%;" align="left"/><p> The application presented allows Maple users to protect<br />files saved in the selected directory against unauthorized <br />access and intentional damage by generating cryptosteganograms<br />which are regular image files of BMP or TIFF format. <br />Unpack the icss.zip file, open the file icssabout.mw<br />and use the application.</p>https://www.maplesoft.com/applications/view.aspx?SID=102316&ref=FeedTue, 08 Mar 2011 05:00:00 ZProf. Czeslaw KoscielnyProf. Czeslaw Koscielny